Virtual Identity Management

The modern identity management category kicked off with the advent of the LDAP protocol. Over the last 20+ years, the identity and access management space has certainly seen dynamic innovation…
The post Virtual Identity Management appeared first on J… Continue reading Virtual Identity Management

What is Single Sign-On?

Single Sign-On (SSO), a subcomponent within Identity and Access Management (IAM), has traditionally been viewed as the ability to login to web apps like Salesforce, Dropbox, and Slack using one…
The post What is Single Sign-On? appeared first on Jump… Continue reading What is Single Sign-On?

Active Directory®-as-a-Service Alternative

There’s a new movement in the IT world to move to ‘as-a-service’ solutions. The benefits of taking an IT solution, and delivering it as a service can be powerful. That’s…

The post Active Directory®-as-a-Service Alternative appeared first on JumpCloud.

The post Active Directory®-as-a-Service Alternative appeared first on Security Boulevard.

Continue reading Active Directory®-as-a-Service Alternative

The Future of Server User Management

As new technology transforms the IT landscape, the future of server user management is being written and rewritten. The makeup of data centers has been completely transformed by the cloud…
The post The Future of Server User Management appeared first … Continue reading The Future of Server User Management

Cloud MFA

Multi-factor authentication (also referred to as 2FA or 2 Factor Authentication) is one of the most important steps you can take to secure your identities. MFA is an added step…
The post Cloud MFA appeared first on JumpCloud.
The post Cloud MFA appea… Continue reading Cloud MFA

Cloud MFA

Multi-factor authentication (also referred to as 2FA or 2 Factor Authentication) is one of the most important steps you can take to secure your identities. MFA is an added step…
The post Cloud MFA appeared first on JumpCloud.
The post Cloud MFA appea… Continue reading Cloud MFA

What are SSH Keys?

If you spend enough time in an IT environment, you will likely come across the term SSH keys. If you’ve already come across this IT term, then you might find…

The post What are SSH Keys? appeared first on JumpCloud.

The post What are SSH Keys? appeared first on Security Boulevard.

Continue reading What are SSH Keys?

Is a Hosted Directory Right for your IT Infrastructure

Directory services have been the core of IT infrastructure since the early 1990’s. However, traditional directory services have had a hard time keeping up with the new wave of IT…

The post Is a Hosted Directory Right for your IT Infrastructure appeared first on JumpCloud.

The post Is a Hosted Directory Right for your IT Infrastructure appeared first on Security Boulevard.

Continue reading Is a Hosted Directory Right for your IT Infrastructure

Manage Samba File Server Access from the Cloud

Can you manage on-prem Samba file server access from the cloud? This is a question that many IT admins are asking as they look to shift more of their infrastructure…
The post Manage Samba File Server Access from the Cloud appeared first on JumpCloud…. Continue reading Manage Samba File Server Access from the Cloud

Outsourced Directory

The core user directory for an organization is a foundational piece of the IT management puzzle. IT admins need centralized control over who can access which IT resources. The way…
The post Outsourced Directory appeared first on JumpCloud.
The post O… Continue reading Outsourced Directory